Automated Libra, a threat actor based in South Africa, has been seen using CAPTCHA bypass methods to programmatically generate GitHub accounts as part of the PURPLEURCHIN free jacking operation.
According to William Gamazo and Nathaniel Quist, researchers at Palo Alto Networks Unit 42, the organisation “primarily targets cloud platforms offering limited-time trials of cloud resources to perform their crypto mining operations.”
When Sysdig showed that the attacker had expanded its operations by creating up to 30 GitHub accounts, 2,000 Heroku accounts, and 900 Buddy accounts, PURPLEURCHIN was first identified in October 2022.
At the peak of its activity in November 2022, the cloud threat actor group, according to Unit 42, “put up between three and five GitHub accounts per minute, totalling over 130,000 fictitious accounts across GitHub, Heroku, and Togglebox.”
The cybersecurity firm also referred to the misuse of cloud resources as a “play and run” strategy intended to avoid paying the platform vendor’s invoice by using stolen or fake credit cards to open premium accounts.
Along with revealing more than 40 wallets and seven different cryptocurrencies, its 250GB data analysis dates the first indication of the crypto campaign to August 2019, which is at least 3.5 years ago.
The threat actor has also been identified as exploiting a flaw in the CAPTCHA check on GitHub to accomplish its illegal goals, in addition to automating the account creation process by utilising the right tools like xdotool and ImageMagick.
Once the account has been successfully created, Automated Libra moves on to setting up a GitHub repository and procedures that enable the activation of external Bash scripts and containers to start the crypto mining operations.
Ultimately, the PURPLEURCHIN campaign demonstrates how hackers can exploit weaknesses in CAPTCHA systems and take advantage of open-source repositories to carry out malicious activities.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...